Open AccessPosted Content
Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond.
TL;DR: The main result is a functional encryption scheme for any general function f of depth d, with succinct ciphertexts whose size grows with the depth d rather than the size of the circuit for f .
read more
Abstract: Functional encryption is a powerful primitive: given an encryption Enc(x) of a value x and a secret key skf corresponding to a circuit f , it enables efficient computation of f(x) without revealing any additional information about x. Constructing functional encryption schemes with succinct ciphertexts that guarantee security for even a single secret key (for a general function f ) is an important open problem with far reaching applications, which this paper addresses. Our main result is a functional encryption scheme for any general function f of depth d, with succinct ciphertexts whose size grows with the depth d rather than the size of the circuit for f . We prove the security of our construction based on the intractability of the learning with error (LWE) problem. More generally, we show how to construct a functional encryption scheme from any public-index predicate encryption scheme and fully homomorphic encryption scheme. Previously, the only known constructions of functional encryption were either for specific inner product predicates, or for a weak form of functional encryption where the ciphertext size grows with the size of the circuit for f . We demonstrate the power of this result, by using it to construct a reusable circuit garbling scheme with input and circuit privacy: an open problem that was studied extensively by the cryptographic community during the past 30 years since Yao’s introduction of a one-time circuit garbling method in the mid 80’s. Our scheme also leads to a new paradigm for general function obfuscation which we call token-based obfuscation. Furthermore, we show applications of our scheme to homomorphic encryption for Turing machines where the evaluation runs in input-specific time rather than worst case time, and to publicly verifiable and secret delegation.
read more
Chat with Paper
AI Agents for this Paper
Find similar papers on Google Scholar, PubMed and Arxiv
Write a critical review of this paper
Analyze citations of this paper to find unaddressed research gaps
Citations
Functional Encryption for Secured Big Data Analytics
Nilotpal Chakraborty,G. K. Patra +1 more
TL;DR: In this paper, possible implementation of ‘Functional encryption’ has been proposed towards a secured big data analytics infrastructure.
Impossibility of Simulation Secure Functional Encryption Even with Random Oracles.
Shashank Agrawal,Venkata Koppula,Brent Waters +2 more
- 11 Nov 2018
TL;DR: In this article, the feasibility of achieving simulation security in functional encryption (FE) in the random oracle model was studied. And the main result is negative in that it is impossible to achieve simulation security even with the aid of random oracles.
9
•Posted Content
Overcoming the Worst-Case Curse for Cryptographic Constructions.
TL;DR: This work addresses the challenge of achieving input-specific runtime rather than worst-case runtime for a wide variety of cryptographic tasks and constructs an attribute-based encryption scheme for any polynomial-time Turing and RAMs and a reusable garbling scheme for arbitrary Turing machines, where the size of the garbling depends only on thesize of the Turing machine.
8
Functional Encryption from (Small) Hardware Tokens
Kai-Min Chung,Jonathan Katz,Hong-Sheng Zhou +2 more
- 01 Dec 2013
TL;DR: In this article, fundamental impossibility results have been demonstrated for constructing functional encryption schemes for general functions satisfying a simulation-based definition of security, which is a limitation of predicate-based functional encryption.
•Dissertation
Efficient techniques for secure multiparty computation on mobile devices
Henry Carter
- 04 Nov 2015
TL;DR: Research Interests Developing efficient secure multiparty computation protocols for mobile applications: applied cryptography, secure mobile applications, privacy-preserving computation, and applied cryptography.
5
References
Fully homomorphic encryption using ideal lattices
Craig Gentry
- 31 May 2009
TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Attribute-based encryption for fine-grained access control of encrypted data
Vipul Goyal,Omkant Pandey,Amit Sahai,Brent Waters +3 more
- 30 Oct 2006
TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Ciphertext-Policy Attribute-Based Encryption
John Bethencourt,Amit Sahai,Brent Waters +2 more
- 20 May 2007
TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Fuzzy identity-based encryption
Amit Sahai,Brent Waters +1 more
- 22 May 2005
TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
How to generate and exchange secrets
Andrew Chi-Chih Yao
- 27 Oct 1986
TL;DR: A new tool for controlling the knowledge transfer process in cryptographic protocol design is introduced and it is applied to solve a general class of problems which include most of the two-party cryptographic problems in the literature.
4.1K
Related Papers (5)
Amit Sahai,Brent Waters +1 more
- 22 May 2005
Dan Boneh,Amit Sahai,Brent Waters +2 more
- 28 Mar 2011
Craig Gentry
- 31 May 2009